ncr

Results 301 - 325 of 4786Sort Results By: Published Date | Title | Company Name
Published By: SAP Ariba     Published Date: Oct 11, 2018
Globalization has presented business leaders with numerous opportunities and challenges to become more competitive and innovative and to drive more value. These opportunities and challenges seem to increase in number and complexity every year whether it is the challenge of scaling limited human and technological resources, sourcing from low-cost countries halfway around the world, or going to market with the latest product innovations.
Tags : 
    
SAP Ariba
Published By: insightsoftware     Published Date: Oct 19, 2018
Today, organizations are squeezing their finance and accounting functions like never before. Expectations are at an all-time high, yet resources are increasingly scarce. They must maintain controls, compliance, and keep up with complex accounting rules — all while meeting business demands for faster turnaround and lower costs.
Tags : 
    
insightsoftware
Published By: insightsoftware     Published Date: Oct 19, 2018
Ninety-five percent of companies polled in a recent Gartner survey considered increasing efficiency and productivity top priorities for IT departments when determining future budgets. Of those companies, 43 percent viewed increasing efficiency as a high priority, while 42 percent considered increased productivity a high priority. Many departments—such as sales or service—focus on the company’s profits. And while a smooth-functioning IT department may contribute to the overall efficiency of an organization, it traditionally provides little to no contribution to the bottom line.
Tags : 
    
insightsoftware
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
    
Preempt
Published By: Dell DnCP     Published Date: Nov 20, 2018
As companies of all types and sizes struggle to survive and thrive in highly competitive markets, increasing employee productivity can provide a crucial edge. Even small gains, multiplied across all employees, can drive considerable growth. The less quantifiable benefits can be even greater, as happier, more productive employees are far more likely to deliver exceptional customer experiences — a key to success in the age of the customer. Find out how to achieve better employee and customer experiences.
Tags : 
    
Dell DnCP
Published By: Dell DnCP     Published Date: Nov 20, 2018
The future of work will increasingly be about delivering superior experiences to both employees and customers. Enabling the workforce with better technology, including the right monitors, is a way to heighten such experiences. With a wide breadth of monitors to fit varying business needs and budgets, learn how Dell can make your business better.
Tags : 
    
Dell DnCP
Published By: Dell DnCP     Published Date: Mar 21, 2019
This IDC InfoBrief, sponsored by Dell, outlines the key trends and priorities around FOW with a specific focus on displays. It also explains how displays are a critical component today for delivering superior experiences as well as for improving productivity and collaboration in the increasingly digitalized world. And to meet the FOW demands and prepare for the Industry 4.0 era, IT and business decision-makers need to rethink their display and monitor strategies.
Tags : 
    
Dell DnCP
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Both public and private organizations acknowledge that managing the PC lifecycle becomes more complicated and expensive as the variety of PC devices and employee workstyles increase. In order to be fully productive, different groups of employees have different needs in terms of end-user device hardware, software, and configuration. While IT departments are trying to provide and support a wider range of technology to an increasingly dispersed and mobile workforce, while maintaining low end- user disruption, they are also under a lot of cost pressure. However, consolidating processes and enlisting the help of a vendor partner, such as Dell, might reduce costs and provide expert-level knowledge for better PC lifecycle management operations. Download this white paper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Both public and private organizations acknowledge that managing the PC lifecycle becomes more complicated and expensive as the variety of PC devices and employee workstyles increase. In order to be fully productive, different groups of employees have different needs in terms of end-user device hardware, software, and configuration. While IT departments are trying to provide and support a wider range of technology to an increasingly dispersed and mobile workforce, while maintaining low end- user disruption, they are also under a lot of cost pressure. However, consolidating processes and enlisting the help of a vendor partner, such as Dell, might reduce costs and provide expert-level knowledge for better PC lifecycle management operations. Download this white paper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Both public and private organizations acknowledge that managing the PC lifecycle becomes more complicated and expensive as the variety of PC devices and employee workstyles increase. In order to be fully productive, different groups of employees have different needs in terms of end-user device hardware, software, and configuration. While IT departments are trying to provide and support a wider range of technology to an increasingly dispersed and mobile workforce, while maintaining low end- user disruption, they are also under a lot of cost pressure. However, consolidating processes and enlisting the help of a vendor partner, such as Dell, might reduce costs and provide expert-level knowledge for better PC lifecycle management operations. Download this white paper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA
Published By: Oracle     Published Date: Dec 21, 2018
Join Oracle’s CX and Marketing Strategy Director, Wendy Hogan, and Senior Vice President Oracle Marketing, Shashi Seth, as they tell how AI, machine learning and data science can engage customers, automate tasks and build ROI. Reaching the right customers on the right channel at the right time, brings rewards for CMOs who embrace these innovations, including engaged customers and increased ROI. Be inspired by the new-generation AI, machine learning and data science and take your marketing to the next level.
Tags : 
    
Oracle
Published By: Unit4     Published Date: Feb 18, 2019
Looking to increase billable utilization for your project teams? While creating high levels of employee satisfaction? And avoiding talent burnout? The top five percent of professional services organizations (PSOs) are experiencing low levels of talent attrition, high levels of employee satisfaction, impressive billable staff utilization rates, and increased revenue from every employee, consultant, and project. Download this eGuide to discover how.
Tags : 
professional services organizations, erp, enterprise resource planning, employee satisfaction
    
Unit4
Published By: Automation Anywhere     Published Date: Feb 21, 2019
Robotic Process Automation was born with the vision of empowering business users to create software bots that could interact with enterprise systems just like humans. Its benefits include substantial time and cost savings, improved customer satisfaction, increased workforce morale, and the ability to build a competitive advantage over competitors. But to fully realize all these benefits, it’s important for businesses to select a solution with a robust RPA security architecture that supports core principles, such as least privileges and separation of duties while delivering end-to-end protection for the critical apps and sensitive data involved. This paper provides an overview of the industry’s highest standard for enterprise-grade security as demonstrated by the market’s leading Digital Workforce platform, Automation Anywhere Enterprise.
Tags : 
    
Automation Anywhere
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: Digital Realty     Published Date: Feb 24, 2015
SingleHop was interested in adding capacity to its data centers while at the same time achieving a predictable cost structure using an outsourcing strategy for the development and management of these mission critical facilities. Find out why they turned to Digital Realty.
Tags : 
cloud iaas, data center, cloud computing, development, it management, data management, business technology
    
Digital Realty
Published By: Digital Realty     Published Date: Feb 24, 2015
Like many of its customers, in recent years NetApp has been faced with an increasingly fast-paced business environment, including an explosion in the amount of data that must be stored and managed, resulting in the need for best-in-class technical operations. They needed a new best-in-class data center to serve as the backbone of your technical operations going forward . Find out why they turned to Digital Realty.
Tags : 
data center, infrastructure management, access control, physical security, it management, business technology
    
Digital Realty
Published By: Thomson Reuters     Published Date: Sep 21, 2012
INTRODUCING THE ALL NEW DATASTREAM PROFESSIONAL
Tags : 
thomson reuters, free trial analytics, macroeconomics, enhanced collaboration
    
Thomson Reuters
Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and efficiency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee